• > sign in
  • > Support
  • English
    • Español (Spanish)
Search
Redborder | NDR Cybersecurity Solution
  • WHAT WE DO
    • Active Cybersecurity Next Generation IPS
    • Network Traffic Analysis (NTA)
    • Security Info & Event Management (SIEM)
    • Wireless Traffic Analysis
    • Hardware monitoring
    • Correlation AI engine
  • Products
    • Manager
    • Intrusion
    • Flow
    • App
  • About us
  • Contact
  • Blog
  • RedBorder LIVE
  • WHAT WE DO
    • Active Cybersecurity Next Generation IPS
    • Network Traffic Analysis (NTA)
    • Security Info & Event Management (SIEM)
    • Wireless Traffic Analysis
    • Hardware monitoring
    • Correlation AI engine
  • Products
    • Manager
    • Intrusion
    • Flow
    • App
  • About us
  • Contact
  • Blog
  • RedBorder LIVE
  • Home
  • What is a vulnerability management program?
  • RedBorder

RedBorder

29SepSeptember 29, 2021

What is a vulnerability management program?

Rosario2024-09-10T08:18:45+00:00

Rapid changes in attack methods and techniques in today's cybersecurity landscape have made maintaining a secure environment increasingly challenging. Organizations are taking cybe...

RedBorder, UncategorizedRead more...
22SepSeptember 22, 2021

Insider threats: what are they and how to prevent them?

Rosario2024-09-10T08:18:45+00:00

There are different online threats that companies face every day. The most common one is phishing attacks where the victim accidentally clicks on an insecure link and logs in. Ot...

RedBorder, UncategorizedRead more...
15SepSeptember 15, 2021

IoT security: risks and solutions

Rosario2024-09-10T08:18:46+00:00

Internet of Things (IoT) is a term used to describe a system of interconnected computing devices that use the Internet to send and receive data without requiring person-to-device o...

RedBorder, UncategorizedRead more...
09SepSeptember 9, 2021

Ransomware attack in the energy and utilities sector

Rosario2024-09-10T08:18:46+00:00

The exponential growth of IoT devices in the energy and utilities industry has significantly increased the focus on cybersecurity. In this context, the energy and utilities secto...

RedBorder, UncategorizedRead more...
02SepSeptember 2, 2021

Metrics that matter: a guide to improving safety reporting

Rosario2024-09-10T08:18:46+00:00

Metrics are vital for security leaders to track the progress of security programs and have effective, risk-focused conversations with business and operational stakeholders. But do ...

RedBorder, UncategorizedRead more...
01JunJune 1, 2021

What is data loss prevention?

Rosario2024-09-10T08:18:46+00:00

The threat landscape is an ever-changing one as the number of cyber attacks continues to increase, data exfiltration now accounts for 70% of ransomware attacks and insiders are r...

RedBorder, UncategorizedRead more...
12AprApril 12, 2021

What is Cyber Threat Intelligence and how to implement it?

Rosario2024-09-10T08:18:46+00:00

  Threat intelligence is data that is collected, processed and analyzed to understand the motives, objectives and attack behaviors of a threat actor. Is data that is co...

RedBorder, UncategorizedRead more...
05AprApril 5, 2021

What is a virtual CISO (vCISO) and when is it advisable to hire their services?

Rosario2024-09-10T08:18:47+00:00

Today, security is a critical concern for organizations in almost every industry due to its complexity and rapid evolution. Threats and vulnerabilities to information protection ...

RedBorder, UncategorizedRead more...
26MarMarch 26, 2021

IoT security analysis: Are your IoT devices secure?

Rosario2024-09-10T08:18:47+00:00

The world of IoT encompasses a wide variety of technologies, vendors and connectivity methods. Although the first things that come to mind when we think of this new technology ar...

RedBorder, UncategorizedRead more...
25MarMarch 25, 2021

10 best practices to combat a ransomware threat

Rosario2024-09-10T08:18:47+00:00

Imagine someone breaks into your house, finds your jewelry, locks it in an inaccessible chest in the middle of your house and then leaves with the key after placing a ransom note...

RedBorder, UncategorizedRead more...
  Prev1…345Next  

Search

Support Center

Redborder Support Center is where you will find general information, FAQ and other documents that provide important information for customers and the community.

redborder

Redborder is a Cybersecurity platform: active, scalable and open source. We unify in one place some of the most powerful Cybersecurity tools such as, Next Generation IPS, Network Traffic Analysis, Security Information & Event Management (SIEM), Hardware Monitoring, Wireless Traffic Analysis (Cyber physics), big data and Correlation AI based engineand much more.

Recent Posts

What We Learned from Monitoring 1 Billion Network Flows
May 14, 2025
Asset Visibility and Shadow IT Detection
April 28, 2025
What is Network Detection and Response (NDR)?
March 14, 2025
Understanding Event-Driven Architecture (and combinations) in Software Engineering
December 12, 2024
Best Practices for Maximising the Use of Redborder NDR
July 29, 2024
Artificial Intelligence in Cybersecurity: Challenges and Solutions in the Face of New Threats
June 17, 2024
Get In Touch

Contact Us

Eneo Tecnología S.L
Innovalia Group
  • Address: Parque Tecnológico de Bizkaia
    Edificio 500 – Planta 1. 48160 Derio (Bizkaia)
  • Phone: 620 19 17 81 / 650 11 06 99
  • Email:
  • Working Days/Hours: Mon - Sun / 9:00 AM - 8:00 PM

Follow Us

Twitter Linkedin
ens
> What we do
> About us
> Support
> Products
> Contact
> Redborder Live

Newsletter

Keep up on our always evolving product features and technology. Enter your e-mail and subscribe to our newsletter.

You have Successfully Subscribed!

Redborder | NDR Cybersecurity Solution © Copyright 2025. All Rights Reserved | Privacy Policy | Cookie Policy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}